Title: The Evolution of Hacking
1The Evolution of Hacking
Deconstructing CyberSecurity
250s, 60s, 70s Freaks and Geeks
3Mr. Eccles requests that anyone working or
hacking on the electrical system turn the power
off to avoid fuse blowing.
4(No Transcript)
5The 80s Curiosity Killed The Cat
6(No Transcript)
7(No Transcript)
890s Party on the Internets
9(No Transcript)
10(No Transcript)
112000s Part I The Gold Rush
12Source Krebs on Security Inside a Carding Shop
- 2014
13Source Bitcoin Affiliate Network 2014
142000s Part 2 InfoWar
15The story of STUXNET
16(No Transcript)
17Today Tomorrows Threats
18Pam The Hackers Starting Point
Network Password on sticky note
Why Merck isnt here today, but Pfizer is in
Conference Room C
Org chart layout for CEO left out in Public.
Unsecured Wifi Password
Computer left on and logged in all day
Open and active network port on phone
Open sign in sheet on desk with all visitors in
last two weeks
Unlocked drawer with a jumble of keys
USB Key with Malware left for Pam to find and try
to locate owner.
19(No Transcript)
20The ransomware is that good. To be honest, we
often advise people just to pay the ransom.
- Joseph Bonavolonta, the Assistant Special Agent
in Charge of the FBIs CYBER and Counterintelligen
ce Program in its Boston office.
21(No Transcript)
22(No Transcript)
23(No Transcript)
24(No Transcript)
25THE primary thing.
Its about people.
26Your Advantages
Your great people who know your business There
are amazing resources available You can learn
from others mistakes
27Next Steps
Establish dedicated resources Communicate
importance Prepare people for change Foster an
open and accepting environment
28Thanks!
- Dr. Doug Jacobsen, ISU Cyber Security Program
- Justyn Miller, CEO of South Slope Cooperative
- Solomon Smith, BISO of Pearson Education, Inc.
- Krebs on Security
- West Goewey, President of NetWest Consulting
- Tim Hansen, Hansen Reynolds Dickinson Crueger,
LLC. - Dr. Joseph Walder, CEO of Integrated DNA
Technologies, Inc.
awarner_at_procircular.com